Static task
static1
Behavioral task
behavioral1
Sample
12acf0eb72660c46861be64f21bf375a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
12acf0eb72660c46861be64f21bf375a.exe
Resource
win10v2004-20231222-en
General
-
Target
12acf0eb72660c46861be64f21bf375a
-
Size
89KB
-
MD5
12acf0eb72660c46861be64f21bf375a
-
SHA1
2607d95ce019b472868c39ba48c4293ff80119ee
-
SHA256
4c774309ebc0e83b881ee0ded5a004c1a276f8e09f6316a4a4aca9dfd5cd1c75
-
SHA512
c035948422f9d21774ad7a456a3403ce811aa5a0f8bccec805458cfd98fba1d38366646b3ee33147c2ce507effd16635ffbac1d469b985b3cb7e83a02966a466
-
SSDEEP
768:T4SiYLn2G2hqCniGU1JTcyZI9BZIVKRvw21nnnnRYZxe6qaKHzRUZziPcr1+ebgY:T4fGgfL4UBZiKRY+Yfrq918ciLg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 12acf0eb72660c46861be64f21bf375a
Files
-
12acf0eb72660c46861be64f21bf375a.exe windows:4 windows x86 arch:x86
28f410223faaff7f94192f8df0976fbd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
GetDiskFreeSpaceA
FindResourceExA
FindAtomA
SetEvent
CloseHandle
ReleaseMutex
FindVolumeClose
GetCalendarInfoA
ExitProcess
SearchPathA
GetLastError
lstrlenA
DeleteCriticalSection
VirtualProtect
GetTickCount
TlsGetValue
CreateThread
GetModuleHandleA
Sleep
user32
IsIconic
EnableWindow
DragDetect
GetKeyState
GetUpdateRect
CreateMenu
CopyImage
EndDialog
GetScrollBarInfo
DispatchMessageA
CloseWindow
GetMessageA
CreateWindowExA
DialogBoxParamA
msdmo
DMOEnum
DMOGetTypes
DMOUnregister
DMOGetName
DMORegister
advapi32
RegCloseKey
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE